[Git][security-tracker-team/security-tracker][master] Clarify which commit fixes CVE-2022-30783 and which CVE-2022-3078{5,7}
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Wed Jun 8 08:35:00 BST 2022
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
5ddd8c18 by Salvatore Bonaccorso at 2022-06-08T09:34:25+02:00
Clarify which commit fixes CVE-2022-30783 and which CVE-2022-3078{5,7}
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -4840,7 +4840,6 @@ CVE-2022-30787 (An integer underflow in fuse_lib_readdir enables arbitrary memor
NOTE: https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-6mv4-4v73-xw58
NOTE: https://www.openwall.com/lists/oss-security/2022/06/07/4
NOTE: Patches: https://github.com/tuxera/ntfs-3g/compare/2021.8.22...2022.5.17
- NOTE: https://github.com/tuxera/ntfs-3g/commit/7f81935f32e58e8fec22bc46683b1b067469405f (2022.5.17)
NOTE: https://github.com/tuxera/ntfs-3g/commit/fb28eef6f1c26170566187c1ab7dc913a13ea43c (2022.5.17)
NOTE: https://unparalleled.eu/publications/2022/advisory-unpar-2022-0.txt
NOTE: https://unparalleled.eu/blog/2022/20220607-help-to-heap-suid-privilege-escalation/
@@ -4855,7 +4854,6 @@ CVE-2022-30785 (A file handle created in fuse_lib_opendir, and later used in fus
NOTE: https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-6mv4-4v73-xw58
NOTE: https://www.openwall.com/lists/oss-security/2022/06/07/4
NOTE: Patches: https://github.com/tuxera/ntfs-3g/compare/2021.8.22...2022.5.17
- NOTE: https://github.com/tuxera/ntfs-3g/commit/7f81935f32e58e8fec22bc46683b1b067469405f (2022.5.17)
NOTE: https://github.com/tuxera/ntfs-3g/commit/fb28eef6f1c26170566187c1ab7dc913a13ea43c (2022.5.17)
NOTE: https://unparalleled.eu/publications/2022/advisory-unpar-2022-0.txt
NOTE: https://unparalleled.eu/blog/2022/20220607-help-to-heap-suid-privilege-escalation/
@@ -4871,7 +4869,6 @@ CVE-2022-30783 (An invalid return code in fuse_kern_mount enables intercepting o
NOTE: https://www.openwall.com/lists/oss-security/2022/06/07/4
NOTE: Patches: https://github.com/tuxera/ntfs-3g/compare/2021.8.22...2022.5.17
NOTE: https://github.com/tuxera/ntfs-3g/commit/7f81935f32e58e8fec22bc46683b1b067469405f (2022.5.17)
- NOTE: https://github.com/tuxera/ntfs-3g/commit/fb28eef6f1c26170566187c1ab7dc913a13ea43c (2022.5.17)
NOTE: https://unparalleled.eu/publications/2022/advisory-unpar-2022-0.txt
NOTE: https://unparalleled.eu/blog/2022/20220607-help-to-heap-suid-privilege-escalation/
CVE-2022-30782 (Openmoney API through 2020-06-29 uses the JavaScript Math.random funct ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5ddd8c1887a775e43540d4cdec4816ceeeb5b26a
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5ddd8c1887a775e43540d4cdec4816ceeeb5b26a
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220608/d96c2848/attachment.htm>
More information about the debian-security-tracker-commits
mailing list